OnlineWoerterBuecher.de
Internes

Lexikon


leapfrog attack


Use of userid and password information obtained illicitly from one host (e.g. downloading a file of account IDs and passwords, tapping TELNET, etc.) to compromise another host. Also, the act of TELNETting through one or more hosts in order to confuse a trace (a standard cracker procedure). [Jargon File]

In addition suitable contents:
[ = ] [ ad ] [ ai ] [ am ] [ an ] [ app ] [ ar ] [ arc ] [ arg ] [ as ] [ at ] [ b ] [ bt ] [ cc ] [ ch ] [ ci ] [ ck ] [ co ] [ com ] [ con ] [ cr ] [ cracker ] [ D ] [ de ] [ do ] [ down ] [ download ] [ du ] [ E ] [ ed ] [ edu ] [ er ] [ ET ] [ et ] [ fi ] [ file ] [ fo ] [ for ] [ fr ] [ gh ] [ h ] [ host ] [ hr ] [ id ] [ il ] [ in ] [ io ] [ is ] [ it ] [ J ] [ Jargon File ] [ ke ] [ Lex ] [ li ] [ load ] [ ls ] [ ly ] [ ma ] [ mo ] [ mod ] [ module ] [ mp ] [ N ] [ na ] [ ne ] [ nf ] [ ng ] [ nl ] [ no ] [ om ] [ pa ] [ password ] [ ph ] [ ping ] [ pr ] [ procedure ] [ query ] [ rc ] [ re ] [ ro ] [ se ] [ so ] [ st ] [ standard ] [ T ] [ tap ] [ tc ] [ TELNET ] [ th ] [ to ] [ tr ] [ ug ] [ us ] [ user ] [ word ]






Go Back ]

Free On-line Dictionary of Computing

Copyright © by OnlineWoerterBuecher.de - (3274 Reads)

All logos and trademarks in this site are property of their respective owner.

Page Generation in 0.0919 Seconds, with 16 Database-Queries
Zurück zur Startseite